SB2024020224 - SUSE update for slurm_20_11
Published: February 2, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Race condition (CVE-ID: CVE-2023-41914)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the slurmd/slurmstepd processes. A local user can exploit the race and gain take ownership of an arbitrary file on the system.
2) Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CVE-ID: CVE-2023-49933)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to improper integrity check. A remote attacker can perform MitM attack and modify RPC traffic.
3) NULL pointer dereference (CVE-ID: CVE-2023-49936)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.
4) Double Free (CVE-ID: CVE-2023-49937)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can send specially crafted data to the application, trigger double free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Improper access control (CVE-ID: CVE-2023-49938)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can modify extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups
Remediation
Install update from vendor's website.